| 研究生: |
陳懿婷 Yi-Ting Chen |
|---|---|
| 論文名稱: |
基於非侵入式手機使用者識別機制即時檢測使用者操作行為收集其建模資料的方法 Using Active Learning to Collect User’s Behavior for Training Model. Base on Non-intrusive Smartphone Authentication |
| 指導教授: | 梁德容 |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 論文出版年: | 2015 |
| 畢業學年度: | 103 |
| 語文別: | 中文 |
| 論文頁數: | 45 |
| 中文關鍵詞: | 非侵入式識別機制 、使用者識別 、主動學習 、支持向量機 |
| 外文關鍵詞: | non-intrusive authentication mechanism, user authentication, active learning, support vector machine |
| 相關次數: | 點閱:12 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著科技進步,智慧型手機可以經由網路連結,達到收發電子信箱、線上交易(網路銀行、電子商務)、社群軟體等功能,無形中使智慧型手機內部資料成為有心人士覬覦的目標。
目前智慧型手機識別機制有侵入式與非侵入式兩種。傳統的驗證機制(密碼鎖、圖形鎖)屬於侵入式識別機制(一次驗證)。非侵入式識別機制則不需要驗證介面,而是從背景收集使用者行為進行驗證。
目前文獻上已有提出非侵入式識別機制數種研究,但皆未考慮訓練樣本選擇與數目,在實際應用上若不考慮此點將耗費使用者許多時間在提供訓練樣本上。
本研究提出即時檢測收集方法利用主動學習搭配支持向量機選擇訓練樣本,在識別效果接受範圍內以少量的訓練樣本建構非侵入式識別機制。
首先本研究提出兩階段資料收集方法,第一階段偵測個人所需的行為樣本情境,第二階段則針對第一階段所分析出的情境加以收集訓練樣本並建模。最後將本論文提出的即時檢測收集方法與批次性方法比較,實驗結果則有一半以上使用者能透過本方法在識別效果不受影響下大幅減少訓練樣本。
In order to protect the data within the smartphone, intrusive and non-intrusive user authentication mechanisms were developed. Traditional authentication mechanisms like number lock and pattern lock are intrusive user authentication mechanism. Non-intrusive user authentication mechanism doesn’t require any user interface, but collect user’s behavior in the background and authenticate it.
Several non-intrusive authentication mechanisms were proposed, but all of them don’t care about the selection of training samples. Actually user to provide the training samples can be very time-consuming.
This study proposes a method to collect real-time detection with the use of active learning support vector machine choose training samples to identify the effect of the acceptable range in a small amount of training samples construction of non-invasive identification mechanism.
First, for this study, we propose two stages collection methodology of behavior.
The first stage of the collection is to detect which behavior scenario need.
The second stage of the collection is to for the first phase of the analysis of the situation and to collect training data modeling.
Finally, this study presents a method to collect real-time detection (active learning) compared with batch learning, results are more than half of users to significantly reduce the training sample to achieve a good recognition results through this method.
[1] I. M. google. (2013). Our Mobile Planet. Available: http://think.withgoogle.com/mobileplanet/zh-tw/
[2] Gartner. (2014). Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments to Grow 4.2 Percent in 2014. Available: http://www.gartner.com/newsroom/id/2791017
[3] What do you use your smartphone for? Available: http://www.mobilefun.co.uk/blog/2012/07/what-do-you-use-your-smartphone-for/
[4] (2015). Consumers and Mobile Financial Services. Available: http://www.federalreserve.gov/econresdata/consumers-and-mobile-financial-services-report-201503.pdf
[5] J. J. Yan, A. F. Blackwell, R. J. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," IEEE Security & privacy, vol. 2, pp. 25-31, 2004.
[6] D. Weinshall and S. Kirkpatrick, "Passwords you'll never forget, but can't recall," in CHI'04 extended abstracts on Human factors in computing systems, 2004, pp. 1399-1402.
[7] C.-C. Lin, D. Liang, and C.-C. Chang, "A new non-intrusive authentication method based on the orientation sensor for smartphone users," in 2012 IEEE 6th International Conference on Software Security and Reliability (SERE), 2012, pp.3270-3274
[8] 許振揚, "非侵入式多模組之手機使用者識別機制:基於動態方法," 國立中央大學, 碩士論文, 2012.
[9] C.-C. Lin, D. Liang, and C.-C. Chang, "A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones," to appear in Journal of Internet Technology, vol. 16, p. 1-10, 2015.
[10] 周彥竹, "整體學習之非侵入式手機使用者識別機制," 國立中央大學, 碩士論文, 2014.
[11] M. Pusara and C. E. Brodley, "User re-authentication via mouse movements," in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004, pp. 1-8.
[12] C.-C. Lin, D. Liang, and C.-C. Chang, "A Preliminary Study on Non-Intrusive User Authentication Method Using Smartphone Sensors," Applied Mechanics and Materials, vols 284-287, pp. 3270-3274, 2013.
[13] A. A. E. Ahmed and I. Traore, "A new biometric technology based on mouse dynamics," Dependable and Secure Computing, IEEE Transactions on, vol. 4, pp. 165-179, 2007.
[14] C.-C. Lin, C.-C. Chang, and D. Liang, "A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones," in Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, 2013, pp. 212-216.
[15] Settles, B., 2009, “Active learning literature survey”, Computer Sciences Technical Report 1648, University of Wisconsin-Madison.
[16] Angluin, D., 1988, “Queries and concept learning”, Machine Learning, pp.319-342.
[17] Cohn, D., Atlas, L., Ladner, R., 1994, “Improving generalization with active learning”, Machine Learning, pp.201-221.
[18] Lewis, D., Catlett., 994, “Heterogeneous uncertainty sampling for supervised learning”, Machine Learning: Proceedings of the Eleventh International Conference, Morgan Kaufmann Publishers, San Francisco, CA, pp. 148–156.
[19] Tong S, Koller D. Support vector machine active learning with applications to text classification [C] //Proc of ICMI 2000. San Francisco: Morgan Kaufmann, 2000: 999-1066.
[20] Seung, H. S., Opper, M., Sompolinsky, H., 1992, “Query by committee”,
COLT '92 Proceedings of the fifth annual workshop on Computational
learning, pp.287-294.
[21] Martin, A. F. et al., "The DET Curve in Assessment of Detection Task Performance", Proc. Eurospeech '97, Rhodes, Greece, September 1997, Vol. 4, pp. 1899–1903.
[22] C.-C. C. a. C.-J. Lin. LIBSVM -- A Library for Support Vector Machines. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm/
[23] M. Böhmer, B. Hecht, J. Schöning, A. Krüger, and G. Bauer, "Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage," in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 2011, pp. 47-56.